


default search action
ACM Transactions on Software Engineering and Methodology, Volume 26
Volume 26, Number 1, July 2017
- Daniel Di Nardo, Fabrizio Pastore
, Lionel C. Briand:
Augmenting Field Data for Testing Systems Subject to Incremental Requirements Changes. 1:1-1:40 - Alireza Sadeghi
, Naeem Esfahani, Sam Malek:
Ensuring the Consistency of Adaptation through Inter- and Intra-Component Dependency Analysis. 2:1-2:27 - Chris Mills, Gabriele Bavota
, Sonia Haiduc, Rocco Oliveto, Andrian Marcus
, Andrea De Lucia
:
Predicting Query Quality for Applications of Text Retrieval to Software Engineering Tasks. 3:1-3:45 - Shin Yoo, Xiaoyuan Xie, Fei-Ching Kuo, Tsong Yueh Chen
, Mark Harman:
Human Competitiveness of Genetic Programming in Spectrum-Based Fault Localisation: Theoretical and Empirical Analysis. 4:1-4:30 - Robert M. Hierons
, Uraz Cengiz Türker:
Parallel Algorithms for Generating Distinguishing Sequences for Observable Non-deterministic FSMs. 5:1-5:34
Volume 26, Number 2, October 2017
- David S. Rosenblum:
Editorial. 6e:1-6e:2 - Giuseppe Scanniello
, Michele Risi, Porfirio Tramontana
, Simone Romano
:
Fixing Faults in C and Java Source Code: Abbreviated vs. Full-Word Identifier Names. 6:1-6:43 - Luciano Baresi
, Angelo Morzenti, Alfredo Motta, Mohammad Mehdi Pourhashem Kallehbasti
, Matteo Rossi:
A Logic-Based Approach for the Verification of UML Timed Models. 7:1-7:47 - Chris Karanikolas
, Grigoris Dimitroulakos, Konstantinos Masselos:
Early Evaluation of Implementation Alternatives of Composite Data Structures Toward Maintainability. 8:1-8:44
Volume 26, Number 3, January 2018
- Paul C. Attie
, Saddek Bensalem, Marius Bozga, Mohamad Jaber, Joseph Sifakis, Fadi A. Zaraket
:
Global and Local Deadlock Freedom in BIP. 9:1-9:48 - Iago Abal, Jean Melo, Stefan Stanciulescu, Claus Brabrand, Márcio Ribeiro
, Andrzej Wasowski
:
Variability Bugs in Highly Configurable Systems: A Qualitative Analysis. 10:1-10:34 - Joshua Garcia, Mahmoud Hammad
, Sam Malek:
Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware. 11:1-11:29
Volume 26, Number 4, February 2018
- Khanh Nguyen
, Kai Wang, Yingyi Bu, Lu Fang, Guoqing Xu:
Understanding and Combating Memory Bloat in Managed Data-Intensive Systems. 12:1-12:41 - Andrea De Lucia
, Vincenzo Deufemia
, Carmine Gravino
, Michele Risi:
Detecting the Behavior of Design Patterns through Model Checking and Dynamic Analysis. 13:1-13:41 - Yi Xiang
, Yuren Zhou, Zibin Zheng
, Miqing Li:
Configuring Software Product Lines by Combining Many-Objective Optimization and SAT Solvers. 14:1-14:46

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.